Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 07:05
Static task
static1
Behavioral task
behavioral1
Sample
ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe
-
Size
61KB
-
MD5
ab6b687ab3e7d9bb9b42b6b2ac1d6a6f
-
SHA1
0eaad7dc12c0b3b57a0ae5536bc61aaddc290d55
-
SHA256
8384b554cad0b47e226e12aafb7e6f3e5ce79c0efaa7b285d5abfc42f86f3ffa
-
SHA512
08f3c7e48fad3caeafd41a98ccfa9ffb46e4c1695f2f914bec9ce58da30090b16d46d63ff7838538c9a2de8cfc95ab58a2b806a21d3364eba1d5fb1bdf0e8547
-
SSDEEP
768:qGYme+TRdyGiIjJot9plP5MdxU/99acjCouPotoEr5ZI5w0PzQEgr0+yicozN3pJ:qme+TsI8lBYa/99hjaotp5ZmNrAySNZ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\ggdrive32.exe" ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2060 ggdrive32.exe 2980 ggdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\ggdrive32.exe" ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4032 set thread context of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 2060 set thread context of 2980 2060 ggdrive32.exe 87 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\ggdrive32.exe ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe File created C:\Windows\%windir%\lfffile32.log ggdrive32.exe File created C:\Windows\ggdrive32.exe ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggdrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 2768 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 2768 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 2768 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 4032 wrote to memory of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 4032 wrote to memory of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 4032 wrote to memory of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 4032 wrote to memory of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 4032 wrote to memory of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 4032 wrote to memory of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 4032 wrote to memory of 2768 4032 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 85 PID 2768 wrote to memory of 2060 2768 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 86 PID 2768 wrote to memory of 2060 2768 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 86 PID 2768 wrote to memory of 2060 2768 ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe 86 PID 2060 wrote to memory of 2980 2060 ggdrive32.exe 87 PID 2060 wrote to memory of 2980 2060 ggdrive32.exe 87 PID 2060 wrote to memory of 2980 2060 ggdrive32.exe 87 PID 2060 wrote to memory of 2980 2060 ggdrive32.exe 87 PID 2060 wrote to memory of 2980 2060 ggdrive32.exe 87 PID 2060 wrote to memory of 2980 2060 ggdrive32.exe 87 PID 2060 wrote to memory of 2980 2060 ggdrive32.exe 87 PID 2060 wrote to memory of 2980 2060 ggdrive32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab6b687ab3e7d9bb9b42b6b2ac1d6a6f_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\ggdrive32.exe"C:\Windows\ggdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\ggdrive32.exe"C:\Windows\ggdrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5ab6b687ab3e7d9bb9b42b6b2ac1d6a6f
SHA10eaad7dc12c0b3b57a0ae5536bc61aaddc290d55
SHA2568384b554cad0b47e226e12aafb7e6f3e5ce79c0efaa7b285d5abfc42f86f3ffa
SHA51208f3c7e48fad3caeafd41a98ccfa9ffb46e4c1695f2f914bec9ce58da30090b16d46d63ff7838538c9a2de8cfc95ab58a2b806a21d3364eba1d5fb1bdf0e8547